Return-Path: X-Original-To: apmail-cassandra-user-archive@www.apache.org Delivered-To: apmail-cassandra-user-archive@www.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id 7185C177E1 for ; Thu, 23 Oct 2014 09:17:25 +0000 (UTC) Received: (qmail 84235 invoked by uid 500); 23 Oct 2014 09:17:21 -0000 Delivered-To: apmail-cassandra-user-archive@cassandra.apache.org Received: (qmail 84195 invoked by uid 500); 23 Oct 2014 09:17:21 -0000 Mailing-List: contact user-help@cassandra.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: user@cassandra.apache.org Delivered-To: mailing list user@cassandra.apache.org Received: (qmail 84185 invoked by uid 99); 23 Oct 2014 09:17:21 -0000 Received: from ec2-54-191-145-13.us-west-2.compute.amazonaws.com (HELO mx1-us-west.apache.org) (54.191.145.13) by apache.org (qpsmtpd/0.29) with ESMTP; Thu, 23 Oct 2014 09:17:21 +0000 Received: from mx1-us-west.apache.org (localhost [127.0.0.1]) by mx1-us-west.apache.org (ASF Mail Server at mx1-us-west.apache.org) with ESMTP id 4CC2825DB8 for ; Thu, 23 Oct 2014 09:17:21 +0000 (UTC) Received: by mx1-us-west.apache.org (ASF Mail Server at mx1-us-west.apache.org, from userid 114) id 41D6C26EE8; Thu, 23 Oct 2014 09:17:21 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on mx1-us-west.apache.org X-Spam-Level: X-Spam-Status: No, score=1.0 required=10.0 tests=HTML_MESSAGE, RCVD_IN_DNSWL_LOW,RCVD_IN_MSPIKE_H2,SPF_PASS,T_DKIM_INVALID autolearn=disabled version=3.4.0 Received: from mail-lb0-f172.google.com (mail-lb0-f172.google.com [209.85.217.172]) by mx1-us-west.apache.org (ASF Mail Server at mx1-us-west.apache.org) with ESMTPS id 78BB126EE4 for ; Thu, 23 Oct 2014 09:17:20 +0000 (UTC) Received: by mail-lb0-f172.google.com with SMTP id b6so488247lbj.17 for ; Thu, 23 Oct 2014 02:17:13 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:from:date:message-id:subject:to:content-type; bh=kpS4uxBuwZD3Jg6wv9qJmK0dpvgJWo7EDdjxmX9/DHY=; b=OkKXI5FSDYdqiPb48/vKTf9fRs1GNnKZ/6sia/Ca3i0SxbbbAFT/ZVl0LFgtL1mw4q q+/FOaw7Jr/t53MhLKIPB3uf2LTVuldKXbkAO9dHbYYQEqE0LQS9Y+lpP+qtP2t1qydL 1FOLbYOlNvkk3Ky/PryEopCHwd6dF8EST6yP2FHwwNj80PUlR4vpNc2xHCqC+WhpbGjI wFgzhlH7+7GXkEk0MOH6hqndCZV0mchCJFwbtghfwSFkjlUmXWqwNra+NGV1eKEiTAtS Hn7JKpwe08ipJbcMiQiDbr/lvyGAtvOyn1STZ7VlwFpMg0V16iKbgq1N0pvrVz9w1OBL n68A== X-Received: by 10.112.26.71 with SMTP id j7mr1754765lbg.96.1414055833285; Thu, 23 Oct 2014 02:17:13 -0700 (PDT) MIME-Version: 1.0 Received: by 10.112.57.202 with HTTP; Thu, 23 Oct 2014 02:16:53 -0700 (PDT) From: Alain RODRIGUEZ Date: Thu, 23 Oct 2014 11:16:53 +0200 Message-ID: Subject: Multi Datacenter / MultiRegion on AWS Best practice ? To: user@cassandra.apache.org Content-Type: multipart/alternative; boundary=001a1133aed4a2b9d10506138706 X-Virus-Scanned: ClamAV using ClamSMTP --001a1133aed4a2b9d10506138706 Content-Type: text/plain; charset=ISO-8859-1 Hi, We are currently wondering about the best way to configure network architecture to have a Cassandra cluster multi DC. Reading previous messages on this mailing list, I see 2 main ways to do this: 1 - 2 private VPC, joined by a VPN tunnel linking 2 regions. C* using EC2Snitch (or PropertyFileSnitch) and private IPs. 2 - 2 public VPC. C* using EC2MultiRegionSnitch (and so public IPs for seeds and broadcast, private for listen address). On solution one we are not confident on VPN tunnel about stability and performances, the rest should work just fine. On solution 2, we would need to open IPs one by one on 3 ports (7000, 9042, 9160) at least. 100 entries in a security group would allow us to have a maximum of ~30 nodes. An other issuer is that a ring describe (using astyanax let's say) would also give to clients public IPs, our clients which are also inside the VPC, would have to go to the internet before coming back to VPC, creating unnecessary latencies. What are your advices regarding best practices for a multiDC (cross region) inside AWS cloud ? And by the way, how to configure Astyanax when using EC2MultiRegionSnitch (and public IP for broadcasting) to use private IPs instead of public ones ? Alain --001a1133aed4a2b9d10506138706 Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable
Hi,

We are currently wondering about th= e best way to configure network architecture to have a Cassandra cluster mu= lti DC.

Reading previous messages on this mailing = list, I see 2 main ways to do this:

1 - 2 private = VPC, joined by a VPN tunnel linking 2 regions. C* using EC2Snitch (or=A0Pro= pertyFileSnitch) and private IPs.
2 - 2 public VPC. C* using EC2M= ultiRegionSnitch (and so public IPs for seeds and broadcast, private for li= sten address).

On solution one we are not confiden= t on VPN tunnel about stability and performances, the rest should work just= fine.

On solution 2, we would need to open IPs on= e by one on 3 ports (7000, 9042, 9160) at least. 100 entries in a security = group would allow us to have a maximum of ~30 nodes. An other issuer is tha= t a ring describe (using astyanax let's say) would also give to clients= public IPs, our clients which are also inside the VPC, would have to go to= the internet before coming back to VPC, creating unnecessary latencies.

What are your advices regarding best practices for a= multiDC (cross region) inside AWS cloud ?=A0

And = by the way, how to configure Astyanax when using EC2MultiRegionSnitch (and = public IP for broadcasting) to use private IPs instead of public ones ?

Alain
--001a1133aed4a2b9d10506138706--